Module 7: Networking Fundamentals: Understanding TCP/IP and Networking Flashcards

1
Q

What is a host?

A

A computer that can be either the client or the server using client/server applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a node?

A

Any computer, printer, smart thermostat, or other networked device that can be addressed on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Are all nodes considered hosts?

A

Every host is a node, but not every node is a host. Examples of nodes that are not hosts are network equipement; routers, hubs, switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How are client or server applications running on a computer identified?

A

By a port address, also called a port or port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ identifies a node and its network connection

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 2 types of IP addresses (w/ details)?

A

32bit which is IPv4, written as 4 decimal numbers
28bit which is IPv6, written as 8 hexadecimal numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is used to identify a network adapter (NIC)?

A

MAC addresses, a 48 bit identification number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is this an example of, 00-0C-6E-4E-AB-A5?

A

MAC address written in hexadecimal or hex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a host name?

A

A human-readable label assigned to a device connected to a network and can be used in place of its IP address?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where can you change the host name/computer name?

A

In the about window and clicking Rename this PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of a domain name? Give examples

A
  • Identifies a network
  • For example, the names that appear before the period in microsoft.com, cengage.com, and mycompany.com
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the meaning of the letters after a domain name

A
  • The letters after the period are called the toplevel domain and tell you something about the domain.
    .com (commercial)
    .org (nonprofit)
    .gov (government)
    .edu (education)
    .info (general use)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ identifies a computer and the nework to which it belongs.

A

Fully Qualified Domain Name (FQDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Using Cengage, what is the FQDN? Explain in detail

A

www.cengage.com
host name - www
domain name - cengage
top level domain name - com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A fully qualified domain name (FQDN) must be associated with an ____ before the computer can be found on the internet.

A

IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Transmission Control Protocol/Internet Protocol (TCP/IP)?

A

a suite of protocols or rules that define network communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In order from top to bottom, what are the four layers of the TCP/IP model?

A

Application Layer
Transport Layer
Internet (Network) Layer
Link (Network Access) Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain a message from browser to web server using the TCP/IP model

A

1) Application Layer: Browser client sends request to web server. The request is sent through the OS which formats the message using the HTTP protocol and passed to the Transport Layer.
2) Transport Layer: The HTTP request gets encapsulated into a TCP segment which includes source/destination port numbers, 80. TCP provides reliable, connection-oriented communication between the client and server. This includes features like flow control, error detection, and retransmission of lost packets.The TCP segment is then passed down to the internet layer.
3) Internet Layer: The TCP segment is encapulated futher into an IP packet to ensure the message reaches the desintation host on the local network. The IP packet contains source and desintation IP and TTL value. Then it gets passed to the Link Layer.
4) Link Layer: The physical network that receives the IP packet and gets encapsulated into a data frame w/ error checking information. The data frame includes the NIC MAC address of the source and destination address. The switch or router forwards the message to the network.

  • On the Network: The IP at the Internet Layer is used to find the correct destination network (router/firewall). If an Intranet exists within destination network, the IP address is used again to find the correct network within the Intranet. Then the MAC address at the Link Layer finds the correct computer or host on the LAN.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a protocol data unit (PDU)? Give examples

A

A term used in networking to describe the unit of information transmitted across a network at various layers of the OSI model or the TCP/IP suite

  • Application Layer: The PDU at this layer is called a “message.”
  • Transport Layer: The PDU at this layer is called a “segment” (for TCP) or “datagram” (for UDP).
  • Internet Layer: The PDU at this layer is called a “packet.”
  • Link Layer: The PDU at this layer is called a “frame.”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name the layers of the OSI model and its PDU’s

A
  • Application Layer: The PDU at this layer is called a “message.”
  • Presentation Layer: The PDU at this layer is called a “datagram.”
  • Session Layer: The PDU at this layer is called a “datagram.”
  • Transport Layer: The PDU at this layer is called a “segment” (for TCP) or “datagram” (for UDP).
  • Network Layer: The PDU at this layer is called a “packet” or “datagram.”
  • Data Link Layer: The PDU at this layer is called a “frame.”
  • Physical Layer: The PDU at this layer is referred to as a “bit.”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Router? What layer of the OSI and TCP models does it operate on?

A

A device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another.
-OSI: Network Layer
-TCP/IP: Internet Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HTTPS (HTTP secure) refers to the HTTP protocol working with a security protocol such as ____ or ____ to create a secured socket (or channel). Which port is being used?

A
  • Secure Sockets Layer (SSL) or Transport Layer Security (TLS). TLS is better security
  • Uses Port 443 and TCP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A web server “listens” to which port for HTTP (Hypertext transfer protocol)?

A
  • Port 80
  • Uses TCP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Mail servers use which port numbers? and Protocol?

A
  • Simple Mail Trasnport Protocol (SMTP): 25
  • POP3: 110
  • IMAP4: 143
  • All use TCP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which mailing protocol is used to send email? Which protocol downloads the email to the client computer and deletes it from the server?

A

SMTP sends email, POP and IMAP receives email
POP downloads to client and deletes from server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

_____ stores files and makes them available to other computers.

A

File Server or File Share Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What protocols are used or have been used to share files and printers on a network?

A

Server Message Block (SMB) and Common Internet File System (CIFS). CIFS is older tech.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is NetBIOS and NetBT?

A
  • NetBIOS (Network Basic Input/Output System) is an early networking protocol that facilitates communication between devices on a local network.
  • It uses a flat namespace for identifying devices and services
  • NetBT (NetBIOS over TCP/IP) is a version of NETBIOS that operates over TCP/IP networks, communication to occur within the context of the TCP/IP protocol suite
  • NetBIOS is used on legacy systems. DNS is used today
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What ports are used for NetBIOS and NetBT?

A

Ports 137 and 138 for UDP
Ports 138 and 139 for TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What port numbers do SMB and CIFS use? and Protocol?

A
  • Uses Port 445
  • Both TCP and UDP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A _____ manages network printers and makes them available to computers throughout the network.

A

Print Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the difference between a static and dynamic IP address?

A

A static IP address is manually assigned, typically by the sys admin.
A dynamic IP address is auto assigned by a DHCP Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A device that requests an IP address and other information from a DHCP server is called _____.

A

DHCP Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What ports are used by the DHCP (Dynamic Host Configuration Protocol)?

A
  • DHCP server listens at port 67
  • DHCP client receives messages on port 68
  • Uses UDP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the process called of convertering FQDNs into IP addresses?

A

Name Resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the most common method of name resolution? What port number is used in the process?

A
  • DNS (Domain Name System), converting domain names, or FQDNs, into IP addresses.
  • DNS server listens at port 53
  • Both TCP and UDP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Explain the benefits of a Proxy Server (sometimes called an Internet Appliance)

A

Acts a middleman between a client device and the internet for:
- Content Filtering and Access Control: Proxy servers can enforce access policies to filter web content
- Caching: Proxy servers can cache web content to reduce bandwidth usage and improve network performance.
- Security: Proxy servers can act as a firewall between the client device and the internet, preventing malicious content.
- Email Filtering and Access to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is an Authentication, Authorization, Accounter Server (AAA, or triple A server)? What is an example in Windows?

A

It is used to secure and control access to the network and its resources.
Windows Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Explain what AAA servers do

A
  • Authenticate users or computers to the network so they can access network resources and stores user or device credentials, such as user names and passwords.
  • Authorize what a user or computer can do after they have access, including the resources they can access and what they can do with these resources.
  • Account for what a user or computer did with the resources and the time they took. These logs can be useful when users and computers are billed for services they used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

How is LDAP (Lightweight Access Directory Protocol) used in a AAA server?

A
  • LDAP is a viable option for exchanging data and requests between the AAA server and other systems or clients within a network environment.
  • LDAP is commonly used in AAA systems to manage user authentication, authorization, and directory services.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

LDAP uses which port numbers?

A

LDAP uses port 389 (both TCP and UDP)
LDAPS (secure version) listens at port 636

41
Q

_______ is a protocol that gathers event information about various network devices, such as errors, failures, maintenance tasks, and users logging in or out.

42
Q

What is a Syslog Server?

A

A centralized location where logged events, such as errors, failures, maintenance tasks, and users logging in or out, are collected into a database.

43
Q

A server that verifies user identities, controls access to network resources based on predefined policies, and logs user activities for auditing purposes.

A

AAA (Authentication, Authorization, and Accounting) Server

44
Q

A server that translates domain names (e.g., www.example.com) into IP addresses and vice versa. It helps clients locate resources on the internet by resolving human-readable domain names to numerical IP addresses.

A

DNS (Domain Name System) Server

45
Q

A server that dynamically assigns IP addresses, subnet masks, default gateways, DNS server addresses, and other network configuration parameters to client devices on a network. It simplifies network administration by automating IP address management.

A

DHCP (Dynamic Host Configuration Protocol) Server

46
Q

A server that hosts shared folders and files accessible to network users. It allows multiple users to access and share files and folders over a network, facilitating collaboration and data sharing.

A

File Share Server

47
Q

A server that handles the sending, receiving, and storage of email messages. It routes email messages between senders and recipients, stores email messages in user mailboxes, and provides access to email messages using email clients such as Microsoft Outlook or webmail interfaces.

A

Mail Server

48
Q

A server that manages printers and print queues on a network. It allows users to send print jobs to network printers, monitors printer status and availability, and ensures efficient printing across the network.

A

Print Server

49
Q

A server that collects, stores, and analyzes log messages generated by network devices, servers, and applications. It helps administrators monitor system events, troubleshoot issues, detect security incidents, and comply with regulatory requirements by centralizing log management.

A

Syslog Server

50
Q

A server that hosts websites and web applications accessible over the internet or an intranet. It serves web pages in response to client requests, executes web applications, and handles communication between web clients (browsers) and web servers using HTTP or HTTPS protocols.

A

Web Server

51
Q

File Transfer Protocol (FTP) and Server

A

An Application layer protocol used to transfer files between client and server on a network.
- Port 20. The FTP client receives data from the FTP server. (TCP)
- Port 21. The FTP server listens at port 21 for commands from an FTP client(TCP)

52
Q

Telnet Server and Protocol

A
  • Used by an administrator or othe ruser to cocntrol a computer remotely
  • Telnet is not secure
  • Server listens at port 23
  • Uses TCP
52
Q

Secure Shell (SSH) Server and Protocol

A
  • Encrypts communication so hackers cant read the data if they intercept a transmission.
  • Uses port 22
  • Uses TCP
53
Q

_____ protocol is used in various situations for encryption, such as when remotely controlling a computer or when communicating with a web server.

54
Q

___ is commonly used in Linux to pass sign-in information to a remote computer and control that computer over a network.

55
Q

Remote Desktop Protocol (RDP)

A
  • Used by the Windows Remote Desktop and Remote Assistance utilities to connect to and control a remote computer.
  • Both of these servers listens on port 3389
  • Both TCP and UDP
56
Q

Simple Network Management Protocol (SNMP)

A

A versatile service and protocol used to monitor network traffic and manage network devices.
● Port 161. The SNMP agent on the monitored device listens at port 161.
● Port 162. The SNMP server or manager listens at port 162.

57
Q

In SNMP, the device or system that collects and manages information from network devices is referred to as the SNMP manager or SNMP server. Meanwhile, each network device that is monitored or managed using SNMP has a software component called an ____ that gathers information about the device’s status and performance and makes it available to the SNMP manager for monitoring and management purposes.

A

SNMP agent

58
Q

SNMP Agent port and protocol

A

listens at port 161 uses UDP

59
Q

SNMP Manager port and protocol

A

listens at port 162 and UDP

60
Q

TCP uses ____ to establish a connection between a sending and destination host

A

IP addresses

61
Q

Why is TCP considered a connection-oriented protocol?

A

Because it establishes a connection between the sender and receiver BEFORE transferring data. This connection ensures that data is reliably transmitted between the two hosts, with mechanisms in place to acknowledge receipt of data and handle any errors or lost packets. If necessary, data is resent.

62
Q

What are some applications used by TCP?

A

web browsers (HTTP and HTTPS protocols)
email (SMTP, POP3, and IMAP
protocols)
FTP file transfer apps (using FTP
protocol)
SSH apps used to make secure
connections to a server (using SSH protocol).

63
Q

An easy way to know what apps/protocols is ____ ?

A

TCP Guarentees delivery so if the app/protocol requires gauarenteed delivery then it uses TCP.
For example, sending an email requires guaranteed delivery.

64
Q

TCP typically uses a ____ handshake to establish a reliable CONNECTION between the sender and receiver. Name the steps.

A
  • three-way handshake
  • SYN (Synchronize): The client sends a SYN segment to the server, indicating its desire to establish a connection and specifying an initial sequence number.
  • SYN-ACK (Synchronize-Acknowledge): The server responds with a SYN-ACK segment, acknowledging the client’s request and also indicating its own desire to establish a connection. The SYN-ACK segment contains an acknowledgment number and an initial sequence number.
  • ACK (Acknowledge): Finally, the client sends an ACK segment to the server, acknowledging receipt of the server’s SYN-ACK segment and completing the connection establishment process. This segment may also contain data, depending on the application requirements.
65
Q

When TCP message reaches its destination, how does the source know it has been received?

A

An ACK is sent back to then source, thus guaranteed delivery.

66
Q

What Protocol is used when guaranteed is not important but speed is?

A

UDP (User Datagram Protocol)

67
Q

Why is UDP called a connection-less (best-effort) protocol?

A

Because it does not establish a dedicated connection between the sender and receiver before transmitting data. Unlike TCP, which uses a three-way handshake to establish a connection, UDP simply sends datagrams (packets of data) without prior negotiation. As a result, UDP does not guarantee delivery or ensure the order of delivery, making it faster and more lightweight but less reliable than TCP for certain applications.

68
Q

What are some examples of UDP?

A

● Broadcasting, such as streaming live video or sound over the web. (TCP, however, is preferred for video on demand where quality is an issue such as Netflix.)
● Monitoring network traffic. The SNMP agent and manager use UDP.
● Completing simple file transfers. Trivial FTP (TFTP)
● Communicating between DHCP clients and servers. DHCP uses UDP rather than TCP primarily because DHCP clients and servers use broadcasting to communicate on a local network; UDP supports broadcasting, but TCP does not.

69
Q

Trivial File Transfer Protocol (TFTP)

A
  • A small, simple app often used to transfer BIOS updates to firmware on routers and smartphones.
  • It’s also used to transfer a lean pre-execution environment (PXE) operating system from a server to BIOS/UEFI on a computer to boot the computer when it does not have a working OS.
  • Uses UDP
70
Q

In an IPv4 address, each of the four numbers separated by periods is called an _____ and can be any decimal value from _____ to _____, making a total of 4.3 billion possible IPv4 addresses (256x256x256x256).

A

Octet (for 8 bits)
0 to 255 (total value including 0, 256)

71
Q

What TCP/IP information is needed for a host to communicate on a network?

A
  • Its own IP Address, such as 192.168.100.4 (92.168.100 identifies the network, .4 identifies the host)
  • A subnet mask: Helps the host determine whether a destination IP address is on the same local network or a different network, facilitating routing decisions.
  • Default Gateway: The default gateway is the IP address of the router or gateway device that serves as the entry point to other networks or the Internet. It is used when the host needs to communicate with devices on remote networks.
  • IP addresses of one or more DNS servers. It queries a DNS server to find out the IP address of the destination host when it knows only the domain name of the host.
72
Q

How does a computer or other network device know what part of an IP address identifies the network and what part identifies the host?

A
  • The Subnet Mask
  • For example
    Subnet Mask: 255.255.255.0
    IP Address: 192.168.100.4
    Network ID: 192.168.100
    Host: .4
73
Q

Name the steps to view TCP/IP settings in Windows 10

A
  1. Right-click Start and click “Network Connections.” In the Status window, click Change adapter options.
  2. In the Network Connections window, you can see all your connections. Right-click your current connection, and click “Properties”
  3. In the Properties dialog box, select “Internet Protocol Version 4” (TCP/IPv4) and click “Properties.” Typically, the host automatically configured to request the IP, Subnet, & Default Gateway from the DHCP server.
  4. To find out what values have been assigned to this computer, enter cmd in the Windows search box. The Command Prompt window opens. In the window, enter the following: “ipconfig /all”
74
Q

When a computer on a network wants to send a message through TCP/IP to another computer, how does it know if the receiving computer is on the same network or on a different network?

A
  • The sending computer looks at its own IP address along with its subnet mask to determine its network portion (beginning portion of IP).
  • The sending computer examines the destination IP address of the message
  • The sending computer compares its own network portion with the network portion extracted from the destination IP address.
  • If the network portions match, it means the destination computer is on the same network. If not, its on a different network and message is sent to the DEFAULT GATEWAY.
75
Q

IP Address: 192.268.1.168
Subnet Mask: 255.255.255.0

What is the Network ID and Host?

A

192.268.1.168

Network ID: 192.168.1
Host: .168

76
Q

This IP Address 19.200.60.6 in binary is 00010011.11001000.00111100.00000110.

The Subnet Mask 255.255.240.0 in binary is
11111111.11111111.11110000.00000000.

How many bits are used to identify the network?

A

There are 20 ones in the subnet mask. Therefore, 20 bits identify the network.

77
Q

Are both IP addresses on the same network or different networks?

Sender - IP Address 19.200.60.6 in binary is 00010011.11001000.00111100.00000110.

Sender - Subnet Mask 255.255.240.0 in binary is
11111111.11111111.11110000.00000000.

Receiver - IP Address 19.200.51.100 in
binary is
00010011.11001000.00110011.01100100

A

Compare the first 20 bits in the two IP addresses

(00010011.11001000.0011) 1100.00000110
(00010011.11001000.0011) 0011.01100100.

Yes, they match so they are on the same network.

78
Q

If an IP address and subnet mask is written like 15.50.212.59/20, what does it mean and what is it called?

A
  • It means the /20 notation is the first 20 bits in the IP address to identify the network.
  • It is called slash notation or CIDR notation.
79
Q

What is it called when an IP address is available for use on the internet and what is it when it is not allowed for use on the internet?

A

Public IP addresses are for use on the internet and Private IP address are for private networks.

80
Q

List the private network IP address ranges that are reserved for use within private networks and are not routable over the public internet and what are they for?

A
  • Class A: 10.0.0.0 to 10.255.255.255
    (Subnet mask: 255.0.0.0)
  • Class B: 172.16.0.0 to 172.31.255.255 (Subnet mask: 255.240.0.0)
  • Class C: 192.168.0.0 to 192.168.255.255 (Subnet mask: 255.255.0.0)

These addresses are used for internal communication within a network and are not globally unique.

81
Q

If a computer first connects to a network that is using dynamic IP addressing and is unable to lease an IP address from the DHCP server, it generates its own _______.

A

Automatic Private IP Address (APIPA)

82
Q

The APIPA range for IPv4 is ______.

A

169.254.0.1 to 169.254.255.254
(with subnet mask 255.255.0.0)

83
Q

What is NAT (Network Address Translation)?

A
  • A technique designed to conserve the number of public IP addresses needed by a network by sharing a single public IP address (typically attached to the router).
  • Nat is also good for security since all devices connected to the local network will be given private IP addresses hidden behind the public IP address.
84
Q

______ is responsible for keeping track of assigned IP addresses

A

Internet Assigned Numbers authority (IANA)

85
Q

What is used to identify an interface on the IPv6 local network?

A

The last 64 bits or four blocks of the IPv6 address, also called the interface ID.

86
Q

______ are nodes on the same network.

87
Q

What is Multicasting?

A
  • Multicasting is used to deliver messages to all nodes in a targeted, multicast group, who have expressed interest in receiving the data,
  • Example: Streaming media, online gaming, and video conferencing from a server to multiple nodes on a network
88
Q

What is Anycast?

A

Anycasting is used by routers and can identify multiple destinations but a message is delivered only to the closest destination

89
Q

What is Unicast?

A

Unicasting is used to send messages to a single node on a network.

90
Q

What are the three types of IPv6 unicast addresses?

A

Three types of IPv6 unicast addresses
are link local addresses, unique local addresses, and global addresses

91
Q

What is a Link Local Address (local unicast address or local network)?

A
  • Used for limited communication with neighboring nodes in the same link or local network.
  • Similar to the IPv4 APIPA addresses in that they are assigned to the computer by itself, as opposed to the DHCPv6 server, and are not guaranteed to be unique on the network.
  • They are not allowed on the internet or outside of their private network.
92
Q

IPv6 Link Local Addresses prefix notation begins with ______.

93
Q

How do you indentify the interface in a list of interfaces for an IPv6 address? What is it in this example? fe80::8944:aa76:727f:4af8%4

A

The zone ID or scope ID
%4 - Its the IP followed by a % sign and a number.

94
Q

What is a Unique Local Address (ULA)?

A

A private address assigned by a DHCPv6 server, similar to the private IPv4 addresses, that can communicate across subnets within the private network.

95
Q

A Unique Local Address always begins with ____ and is usually assigned to an interface in addition to its self-assigned link local address.

96
Q

Which IPv6 address can be routed on the Internet?

A

Global Address

97
Q

What is Global Address (Global Unicast Address)?

A
  • An IP Address that can be rounted on the Internet, similar to the IPv4 addresses.
  • These addresses are assigned to devices and services that need to communicate with other devices and services across the Internet.
98
Q

The Global Routing Prefix is the first ____ of the IPv6 address and these ___ of the global adddress are assigned to a customer by the ISP.